![cybersecurity week in review](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01112502/cybersecurity_week_in_review1-400x200.jpg)
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability disclosure: Legal risks and ethical considerations for …
![Qlik](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01105626/qlik-1400-400x200.jpg)
Qlik Sense flaws exploited in Cactus ransomware campaign
Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf researchers …
![Zyxel](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01122005/zyxel-broken-400x200.jpg)
Critical Zyxel NAS vulnerabilities patched, update quickly!
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can be easily exploited by …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/01103729/apple-network2-400x200.jpg)
Apple patches two zero-days used to target iOS users (CVE-2023-42916 CVE-2023-42917)
With the latest round of security updates, Apple has fixed two zero-day WebKit vulnerabilities (CVE-2023-42916, CVE-2023-42917) that “may have been exploited against …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: December 1, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Amazon, Datadog, Entrust, Fortanix, GitHub, Nitrokey, and Paladin Cloud. Amazon One …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142725/cloudfiles2-400x200.jpg)
Bridging the gap between cloud vs on-premise security
With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10161012/laptop-fire-400x200.png)
Unhappy network professionals juggling more with less
97% of US-based CIOs expressed serious concerns about at least one cybersecurity threat, according to Opengear. Failing to have the correct human oversight over the network …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30161211/industrial-setting2-400x200.jpg)
CISA urges water facilities to secure their Unitronics PLCs
News that Iran-affiliated attackers have taken over a programmable logic controller (PLC) at a water system facility in Pennsylvania has been followed by a public alert urging …
![NetHSM](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/30132046/nethsm-1400-400x200.jpg)
Nitrokey releases NetHSM, a fully open-source hardware security module
German company Nitrokey has released NetHSM 1.0, an open-source hardware security module (HSM). Nitrokey NetHSM 1.0 features The module can be used for storing and managing a …
![Mosint](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29124308/mosint-osint_tool-400x200.jpg)
Mosint: Open-source automated email OSINT tool
Mosint is an automated email OSINT tool written in Go designed to facilitate quick and efficient investigations of target emails. It integrates multiple services, providing …
![Richard Chambers](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/20112526/richard_chambers-2-auditboard-400x200.jpg)
Bridging the risk exposure gap with strategies for internal auditors
In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03110956/email-400x200.jpg)
Organizations can’t ignore the surge in malicious web links
Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?